vendor:
G Wireless Router F5D7234-4 v5
by:
Aodrulez
9,3
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: G Wireless Router F5D7234-4 v5
Affected Version From: 5.00.12
Affected Version To: 5.00.12
Patch Exists: YES
Related CWE: N/A
CPE: h:belkin:g_wireless_router_f5d7234-4_v5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009
Belkin G Wireless Router RCE PoC
The exploit works in 3 stages. 1. Authentication. 2. Setting up shellcode in the memory at a known location. 3. Triggering an RA register over-write to execute the shellcode. This particular model of router is based on 'embedded Configurable operating system' a.k.a (eCos) version 2.0. The shellcode used in the exploit is a dummy one that basically just triggers an exception & crashes the router, forcing it to reboot.
Mitigation:
Ensure that the router is running the latest firmware version and that all security patches are applied.